Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.
For secure mobile wireless networks whose topologies are changed dynamically in insecure environments, mobile users
need to keep in contact with each other for the purpose of user authentications. For instance, the network formed by a
group of soldiers equipped with wireless devices in a battlefield. Maintaining a high connectivity is crucial in such
networks in order to authenticate scattered individuals and to be able to communicate with each other. To establish
connections, different mobile ad hoc network routing protocols have been developed. However, much research has
shown that these protocols are incapable of maintaining high connectivity when the node density is lower in the
network. This paper proposes a mechanism to enhance the node connectivity, which is specifically effective for mobile
ad hoc networks with lower node densities. It selects some nodes with larger transmission power as strategic nodes to
assist in establishing connections with remote nodes, which are unable to connect with otherwise. The strategic nodes
have the ability to connect with each other. Whenever a remote mobile node has a request to connect to another remote
mobile node, the strategic nodes function as normal mobile nodes and may forward the connection requests to the
desired remote destination node. The mechanism is simulated in different scenarios with various node densities, and the
results show that the node connectivity is generally enhanced with the benefit of lower node density network, gaining
significant improvement.
Conference Committee Involvement (8)
Mobile Multimedia/Image Processing, Security, and Applications 2013
29 April 2013 | Baltimore, Maryland, United States
Mobile Multimedia/Image Processing, Security, and Applications 2012
23 April 2012 | Baltimore, Maryland, United States
Mobile Multimedia/Image Processing, Security, and Applications 2011
25 April 2011 | Orlando, Florida, United States
Mobile Multimedia/Image Processing, Security, and Applications 2010
5 April 2010 | Orlando, Florida, United States
Mobile Multimedia/Image Processing, Security, and Applications 2009
14 April 2009 | Orlando, Florida, United States
Mobile Multimedia/Image Processing, Security, and Applications 2008
19 March 2008 | Orlando, Florida, United States
Mobile Multimedia/Image Processing For Military And Security Applications 2007
11 April 2007 | Orlando, Florida, United States
Mobile Multimedia/Image Processing for Military and Security Applications
20 April 2006 | Orlando (Kissimmee), Florida, United States
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.